Kali :An Ocean of TOOLS!

As you have just switched on your k.linux machine you must have found out hundreds of tools. Basically the tools are divided broadly into categories :

  1. Information Gathering
  2. Vulnerability Analysis
  3. Wireless Attacks
  4. Exploitation Tools
  5. Forensics Tools
  6. Stress Testing
  7. Sniffing and Spoofing
  8. Password Attacks
  9. Hardware Hacking
  10. Maintaining Access
  11. Reverse Engineering
  12. Reporting Tools

Information Gathering:

Information Gathering has a huge number of tools as i told you earlier it does 85% of job of the total attack mission.How ever the most common ones we will be using daily are:

  1. Recong-ng
  2. Wireshark
  3. SSl strip
  4. Nmap
  5. SET
  6. Dnsenum

Tools come with kali:

Vulnerability Analysis

This also a type of information gathering at some point actually it focuses on the type and nature of the vulnerability and auditing (a security check may not be acknowledge to employees and this is done by certified team to any organisation).

Wireless Attacks

Its a part of Exlpoitation by these tools you can enter the network of any organisation through wireless interface(like wifi or bluetooth) and perform your wireless attacks through and breach into networks.Most popular one which can do the basic job for us are :

  1. Aircrack-ng
  2. coWpatty
  3. wifite
  4. wiifiphisher
  5. reaver
  6. pixiewps
  7. fernwifi cracker
  8. Bluesnarf
  9. Routersploit

Tools come with kali:

Exploitation Tools

These help in exploiting the vulnerabilities that are there in the system or network.Some of the famous ones are:

  1. Armitage
  2. Metasploit Framework
  3. BeEF  framework
  4. ExplotDb
  5. SET
  6. Routersploit

Forensics Tools

These are used to extract information about some previous attacks and help in investigation of postattacks or even during attacks.

Web Applications

Basically web applications are nothing just the websites.These tools are used to trace vulnerability in website and also used to exploit website.There is whole new category of attacks that can be performed on websites that are categorised by OWASP they standardisedcthe attacks into 10 categories.The tools used for it are:

Stress Testing

These basically comprises DOS (DOS the site that ois Denial Of Service Attack performed to turn down the seerver by sending bogus requests) AND DDOS ATTACKS and attacks those are performed checks the how many number of requests a server or wesbite can withstand.The tools used for it are:

Sniffing and Spoofing

Sniffing is actually stealing the transfering data and intercepting the traffic in the network.While spoofing is totally different it faking and inpersonation someone else identity to steal the sensitive data from the target.

Password Cracking

What are password cracking tools ! these tools are used to sniff pssword or to break the hashes into credential password or even bruteforce it(bruteforcing is technique where the try the combination of letters and numbers to breake into )

Hardware Hacking

This is just my favourite section and mainly deals with arduino and rasberry pi or ther microcontrollers/microprocessors how to use them as portable and  hacking device!IT also deals with android hacking

Maintaning Access

Okay now you breached in to thetarget system or network now how to maintain your access if one dont do this quicky he will be thrown out by the security services or softwares(anti-virus).So how to be safe nad until you complete your exloiting mission and clear your traces(this very very important).

 

Reverse Engineering

This might be the popular terms used it actually breaking the components to understnad it working the best example of reverse engineering is checking the machine code of the software and converting the trial software into pro version or full pain version.

Reporting Tools

The security audit report is the key deliverable in any security assessment activity. In Penetration testing, the final deliverable is the report which shows the service provided, the methodology used, findings/results and the recommendation. Many penetration testers find the report making as a boring process because it takes a lot of time and effort.

Hope it helped leave down the suggestions and follow for more posts!

By:

Posted in:


Leave a comment